Configuring Features, Templates, Services, and Users

After you install Cisco Cius tablets in your network, configure their network settings, and add them to Cisco Unified Communications Manager, you must use Cisco Unified Communications Manager Administration to configure telephony features, optionally modify phone templates, set up services, and assign users.

This chapter provides an overview of these configuration and setup procedures. Cisco Unified Communications Manager Administration documentation provides detailed instructions for these procedures.

Telephony Features Available for Cisco Cius

After you add a Cisco Cius to Cisco Unified Communications Manager, you can add functionality to the Cisco Cius. Table 5-1 includes a list of supported telephony features, many of which you can configure using Cisco Unified Communications Manager Administration. The Reference column lists Cisco Unified Communications Manager and other documentation that contains configuration procedures and related information.

For more information about using these features, see the Cisco Cius User Guide.

Note Cisco Unified Communications Manager Administration also provides several service parameters that you can use to configure various telephony functions. For more information about accessing and configuring service parameters, see the Cisco Unified Communications Manager Administration Guide. For more information about the functions of a service, click on the name of the parameter or the question mark help button in the Service Parameter Configuration window.

Table 5-1 Telephony Features for Cisco Cius

Feature

Description

Configuration Reference

All Calls

Allows a user to view a list of active and held calls, sorted in chronological order (oldest first), and incoming and completed calls, sorted newest to oldest

•For more information, see the Cisco Cius User Guide.

•Requires no configuration.

Auto Dial

Allows the Cisco Cius user to choose from matching numbers in the Recent Call History, which includes placed, received and missed calls. To place the call, the user can choose a number from any of these call lists or continue to enter digits manually.

Requires no configuration.

Barge

Allows a user to join a nonprivate call on a shared phone line. Barge features adds a user to a call and converts it into a conference, allowing the user and other parties to access conference features.

Note Cisco Cius can still use barge after the Built In Bridge Enable service parameter is set to off. To prevent a user from using the Barge feature on Cisco Cius, you must disable Barge in Feature Control Policy for the Cisco Cius tablet.

Additional options include allowing calls that are placed from target number to ring through rather than be forwarded and preventing a call-forward loop from exceeding the maximum number of links in a call-forwarding chain.

•DND Incoming Call Alert—Choose the type of alert to play, if any, on a Cisco Cius for incoming calls when DND is active. This parameter is located on both the Common Phone Profile window and the Phone configuration window (Phone Configuration window value takes precedence).

For more information see the "Music On Hold" chapter in the Cisco Unified Communications Manager Features and Services Guide.

Mute

Mutes the audio input for all input devices including, bluetooth and 3.5 mm handsets, media station and tablet speakers, and headset.

Requires no configuration.

Plus Dialing

Allows the user to dial E.164 numbers prefixed with a "+" sign.

To dial the + sign, the user needs to press and hold the "*" key for at least 1 second. This applies to dialing the first digit for an on-hook or off-hook call only.

Requires no configuration.

Protected Calling

Provides a secure (encrypted) connection between two Cisco Cius tablets or a Cisco Cius and IP phone. A security tone is played at the beginning of the call to indicate that both devices are protected. Some features, such as conference calling, shared lines, and Join Across Lines are not available when protected calling is configured. Protected calls are not authenticated.

Users can customize how their Cisco Cius indicates an incoming call and a new voice message.

For more information, see the Cisco Cius User Guide.

Secure and Nonsecure Indication Tone

After a Cisco Cius is configured as secure (encrypted and trusted) in Cisco Unified Communications Manager, it can be given a "protected" status. After that, if desired, the protected device can be configured to play an indication tone at the beginning of a call:

•Play Secure Indication Tone—To enable the protected Cisco Cius to play a secure or nonsecure indication tone, set the "Play Secure Indication Tone" to True. (The default is False.) You set this option in Cisco Unified Communications Manager Administration> System > Service Parameters. Select the server and then the Unified CM service. In the Service Parameter Configuration window, select the option in the Feature - Secure Tone area. (The default is False.)

Only protected Cisco Cius tablets hear these secure or nonsecure indication tones. (Nonprotected devices never hear tones.) If the overall call status changes during the call, the indication tone changes accordingly. At that time, the protected device plays the appropriate tone.

A protected device plays or does not play a tone under these circumstances:

•After the option to play the tone is enabled, Play Secure Indication Tone option is enabled (True):

–When end-to-end secure media is established and the call status is secure, Cisco Cius plays the secure indication tone (three long beeps with pauses).

–After end-to-end nonsecure media is established and the call status is nonsecure, Cisco Cius plays the nonsecure indication tone (six short beeps with brief pauses).

•If the Play Secure Indication Tone option is disabled, no tone is played.

When the device is in screen saver mode, this will turn the display on when a call is ringing.

Enabled.

RTCP

Maintains statistic for audio.

Also used for lip sync in video calls.

Disabled.

Advertise G.722 and iSAC Codecs

Indicates whether the phone application will advertise the wideband codecs to the Cisco Unified Communications Manager.

Codec negotiation involves two steps:

1. The phone application must advertise the supported codecs to the Cisco Unified Communications Manager.

2. When the Cisco Unified Communications Manager gets the list of supported codecs from all phones involved in the call attempt, it chooses a commonly supported codec based on various factors, including the region pair setting.

Use System Default

Valid values:

•System Default—Phone application will defer to the setting specified in the enterprise parameter, Advertise G.722 and iSAC Codecs.

•Disabled—Phone application will not advertise the wideband codecs to the Cisco Unified Communications Manager.

•Enabled—Phone application will advertise the wideband codecs to the Cisco Unified Communications Manager.

Video Calling

When enabled, indicates that the device will participate in video calls.

Enabled.

Wifi

Indicates whether the Wi-Fi on the device is enabled or disabled.

Enabled.

Note For the Enterprise and Common settings, the Wifi parameter is set at the default value (enabled) and the "Override Common Settings" check box is checked.

Note For the Device setting, the Wifi parameter is left at the default value (enabled) but without the "Override Common Settings" check box checked.

Tip Cisco recommends that a new common phone profile be created for Cisco Cius devices with "Wifi" parameter set to enabled if the deployment environment default setting at the enterprise and common level is disabled, unless it is the company's policy to set the Wifi default to disabled for all devices.

PC Port

Indicates whether the PC port on the media station is enabled or disabled.

Note The port labeled "COMPUTER" on the back of the media station connects a PC or workstation to the media station so they can share a single network connection.

Enabled.

Span to PC Port

Indicates whether the device will forward packets transmitted and received on the media station network port to the PC port.

Note Select "Enabled" if an application is being run on the PC port that requires monitoring of the device traffic, such as monitoring and recording applications or network packet-capture tools used for diagnostic purposes. To use this feature PC Voice VLAN access must be enabled.

Disabled.

PC Voice VLAN Access

Indicates whether a device attached to the PC port on the media station is allowed access to the Voice VLAN.

Note Disabling Voice VLAN Access prevents the attached PC from sending and receiving data on the Voice VLAN. It also prevents the PC from receiving data sent and received by the device.

Enabled.

PC Port Remote Configuration

Allows remote configuration of the PC port speed and duplex of the device when docked.

Disabled.

Switch Port Remote Configuration

Allows remote configuration of the switch port speed and duplex of the device when docked. This overrides any manual configuration on the device.

Caution Be aware that configuring this port may cause the device to lose network connectivity when it is on the media station.

Allows administrator to set Power Priority for Link Layer Discovery Protocol.

Unknown.

Power Negotiation

Allows administrator to enable or disable Power Negotiation.

Note Enable the Power Negotiation feature when the media station is connected to a switch that supports power negotiation. However, if a switch does not support power negotiation, disable the Power Negotiation feature before you power up accessories over PoE+.

Allows the administrator to lock the device to prevent unauthorized user access.

Disabled.

Wipe Device

Allows the administrator to erase the user data and configuration on the device.

Disabled.

Secure Shell (SSH) Access

Determines whether the device will accept SSH connections. Disabling the SSH server functionality of the device will block access to the device.

•Enabled.

•Disabled.

Disabled.

Load Server

Indicates that the device will use an alternative server to obtain firmware loads and upgrades, rather than the defined TFTP server.

Hostname or the IP address of local server.

Maximum length: 256.

Peer Firmware Sharing

Enables or disables Peer to Peer image distribution in order to allow a single device in a subnet to retrieve an image firmware file and then distribute it to its peers.

Enabled.

Log Server

Specifies an IP address and port of a remote system to which log messages are sent.

IP address of remote system.

Maximum length: 32.

Web Access

Indicates whether the device will accept connections from a web browser or other HTTP client.

Disabled.

Android Debug Bridge (ADB)

Enables or disables the ADB on the device.

Can be set to Enabled, Disabled, or User Controlled.

Disabled.

Allow Applications from Unknown Sources

Controls whether the user can install Android applications on the device from a URL or from Android packages (APK) that are received through email, through instant message (IM), or from a Secure Digital (SD) card.

Can be set to Enabled, Disabled, or User Controlled.

Disabled.

Allow Applications from Android Market

Controls whether the user can install Android applications from the Android Marketplace.

The fully-qualified domain name to use when users log into AppHQ. If empty, the user will specify their own domain name along with their username.

The AppHQ domain is used to associate the user to a given Custom AppHQ store, if it exists. Example: cisco.com.

Empty field.

Maximum length: 256.

Enable Cisco UCM App Client

Controls whether the Application Client runs on the device. When the Application Client is enabled, users can select the applications they want to install from the Cisco Unified Communications Manager.

False.

Company Photo Directory

Specifies the URL that the device can query for a user and get the image associated with that user.

After you set the parameters, check the Override Common Settings check box for each setting you wish to update. If you do not check this check box, the corresponding parameter setting does not take effect. If you set the parameters at the three configuration windows, the setting takes precedence in the following order:

The VPN Settings menu allows you to enable the VPN Client connection using the Secure Sockets Layer (SSL). Use the VPN connection when Cisco Cius is located outside a trusted network or when network traffic between Cisco Cius and Cisco Unified Communications Manager must cross untrusted networks.

Follow these steps from to configure VPN profiles. For more information, see the Cisco Unified Communications Manager Security Guide and the Cisco Unified Communications Operating System Administration Guide.

Note Up to 10 certificates can be assigned to a VPN Gateway. Assign at least one certificate to each gateway. Only certificates associated with the VPN role display in the available VPN certificates list.

VPN Authentication

Note For Password Only authentication, the deviceID is prefilled as the username; Adaptive Security Appliance (ASA) configures the username.

Note The authentication specified on Cisco Unified Communications Manager must match authentication set on the ASA. If the authentication specified on Cisco Unified Communications Manager does not match that on the ASA, the user VPN is still allowed, but password persistence and autoConnect features are not applicable.

To enable Cisco Cius to start streaming video immediately at the beginning of the call, enable "Video Calls" on the Call Settings menu (Settings > Call settings). Table 5-4 describes the optional values for the parameter.

Table 5-4 Video Call Settings

Option

Description

Off

Off

On - Good

On and set to experience a good video quality

On - Better (Recommended)

On and set to experience a better video quality

On - Best

On and set to experience the best video quality

Note When the "Video Calls" option is set to "Off," the "Auto Transmit Video" setting will be grayed out. All video settings under the Call settings menu will be grayed out if Video Calling is disabled in the Product Specific Configuration Layout Window.

Configuring Instant Messaging and Presence

Instant Messaging and Presence (IM&P) allows users to communicate any time, any place, and with any device. Cisco Cius supports Jabber IM with either CUP or WebEx backend server. For security reasons, all cloud-based IM&P traffic is routed via proxy. See the "Configuring Web Proxy" section for more information on configuring proxy.

Instant Messaging and Presence is configured at the device, group, or enterprise levels in the Product Specific Configuration window of Cisco Cius. See the "Configuring Product-Specific Options" section for appropriate navigation in Cisco Unified Communications Manager Administration. Enter the Host name or IP address for the Presence and IM Server (Primary) and Presence and IM Server (Backup), and indicate the Presence and IM Server type. See Table 5-2 for more information.

Configuring Visual Voicemail

Visual Voicemail is configured for all Cius devices or to an individual user or group of users from Cisco Unified Communications Manager Administration. Use the following procedure to configure Visual Voicemail for all Cius devices:

For more information on configuring and synchronizing Visual Voicemail, see the "Voice-Mail Profile Configuration" chapter of the Cisco Unified Communications Manager Administration Guide. For information on setting up a voicemail account, see the Cisco Cius User Guide.

Configuring Web Proxy

This feature allows the user to enable and configure Web Proxy. Web Proxy can be enabled or disabled on Cisco Cius and configured either manually or by specifying proxy auto-configuration (PAC) files. Using existing wired (Ethernet) and wireless (Wi-Fi) interfaces, you can add new proxy configuration and view, modify, or delete existing proxy configurations.

Configuring Screen Lock and Display Idle Time Out

The Screen Lock Timeout value controls the normal Android idle timeout when the screen turns off and the screen lock is activated. The variable is configurable within a range of 1 to 60 minutes.

The Display Idle Time Out value controls how long the display will stay on before dimming or going off while the device is docked. If Cisco Cius is in the Always On Mode, the device will dim. If Cisco Cius is in the Nightlight Mode, it will turn off completely. The Display Idle Time Out value is configurable up to a maximum value of 24 hours.

When Cisco Cius is docked, the Screen Lock Timeout and Display Idle Time Out timers operate in parallel. Cisco Cius will not dim or turn off until the Display Idle Time Out value is reached. Table 5-6 shows the relationship of the Screen Lock Timeout value and Display Idle Time Out value.

Table 5-6 Screen Lock and Display Idle Time Out Value Relationship

Condition

Outcome

Screen Lock Timeout value less than Display Idle Time Out value

When the Screen Lock Timeout value is reached, screen stays at full brightness; locked screen displays.

Display Idle Time Out value less than Screen Lock Timeout value

When the Display Idle Time Out value is reached, two outcomes are possible:

•If Cisco Cius is in Always On mode, the device will dim when the Display Idle Time Out value is reached. When the Screen Lock Timeout value is reached, the device will lock and remain dimmed.

•If Cisco Cius is in Nightlight mode, the device will lock and turn off when the Display Idle Time Out value is reached. When the Screen Lock Timeout value is reached, no additional changes occur.

Screen Lock Timeout value the same as the Display Idle Time Out value

When the value is reached, screen stays at full brightness; locked screen displays.

Configuring Screen Unlock/Password Reset

This feature allows the user to reset the PIN/password that is used for unlocking the screen. The user can reset the PIN/password by using Cisco Unified Communications Manager, Cisco AppHQ, or configured Google Account credentials. Use the following procedure to reset the PIN/password using Cisco Unified Communications Manager.

Provisioning Applications

Cisco Cius users can download applications to customize and extend the capabilities of the device. Applications are available from the Cisco AppHQ and the Android marketplace. Cisco Unified Communications Manager Administration provides access to applications through configuration of the following parameters (in the Product Specific Configuration window):

•Allow Applications from Unknown Sources—Controls the ability of user to install applications from sources other than AppHQ or Android marketplace.

•Allow Applications from Android Market—Controls the ability of user to install applications from Android marketplace.

•Allow Applications from Cisco AppHQ—Allows Admin to restrict whether or not the AppHQ application is available on the end user devices. If enabled, it will allow users to use the AppHQ client and obtain applications.

Note The desktop virtualization applications in AppHQ have been optimized to run on Cisco Cius. Do not download generic versions from other application repositories.

•Enable Cisco Unified CM Application Client—Allows the Cisco Unified CM Application Client to show up on end users' devices as an application, and allows the end user the ability to select to download and use phone services already provisioned in Cisco Unified Communications Manager. This is an alternative to the end user using the Cisco Unified Communications Manager end user pages to provision applications and services.

Pushing Applications from Cisco Unified Communications Manager

To push applications from Cisco Unified Communications Manager, first configure the application as a phone service and then subscribe Cisco Cius to the service.

Configuring an Application as a Phone Service

Configure an application as a phone service using the following steps:

Step 3 In the IP Phone Services Configuration window, enter the location of the APK in the Service URL field.

Note The Service Version field is important. Cisco Cius will get the new APK from Cisco Unified Communications Manager if the device version is less than what is on Cisco Unified Communications Manager.

When configuring Android APK services, note the following:

•Packagename specified in the manifest should be used as the Service Name.

•VersionCode can be used as the Service Version in the IP Phone Services Configuration window.

•Service Vendor field is optional.

•Service Category should be "Android APK."

Note For best performance and deployment of applications provisioned through Cisco Unified Communications Manager, Cisco recommends specifying the versionCode when creating service. If versionCode is not specified, the device will search for an updated Android Package file on site each time. Blank versionCode is useful during development of application. The versionCode is an integer and is different than the versionName that users can view from the Settings application. If users are obtaining applications through AppHQ, no versionCode information is required to be set by administrators.

Note Services must be assigned to each Cisco Cius device. Alternatively, you can run a BAT tool to assign services to multiple devices. The devices must be reset after services are assigned.

Modifying Phone Button Templates

Phone button templates let you assign speed-dial and call-handling features to programmable buttons. Call-handling features that can be assigned to buttons include "All Calls," "Do Not Disturb," "Privacy," "Speed Dial," and "Mobility."

Ideally, you modify templates before registering Cisco Cius tablets on the network. In this way, you can access customized phone button template options from Cisco Unified Communications Manager during registration.

Configuring Feature Control Policies

You can limit the appearance of some telephony features on Cisco Cius by enabling or disabling these features in the feature control policy configuration. If you disable a feature in the feature control policy configuration for Cisco Cius, you restrict user access to the feature.

To add users in batches, use the Bulk Administration Tool. This method also allows you to set an identical default password for all users.

For more information, go to the "Bulk Administration" chapter in the Cisco Unified Communications Manager Administration Guide.

Managing the User Options Web Pages

From the User Options web page, users can customize and control several Cisco Cius features and settings. For detailed information about the User Options web pages, see the "User Group Configuration"chapter of the Cisco Unified Communications Manager Administration Guide.

Giving Users Access to the User Options Web Pages

Before a user can access the User Options web pages, you must add the user to the standard Cisco Unified Communications Manager end user group and associate the appropriate Cisco Cius with the user.

To add the user to the standard Cisco Unified Communications Manager user group, follow these steps:

Step 5 Use the Find User drop-down list boxes to find the users that you want to add, and click Find.

Step 6 A list of users that match your search criteria appears.

Step 7 In the list of records that is displayed, click the check box next to the users that you want to add to this user group. If the list comprises multiple pages, use the links at the bottom to see more results.

Note The list of search results does not display users that already belong to the user group.